Home
last modified time | relevance | path

Searched refs:digests (Results 1 – 19 of 19) sorted by relevance

/linux/security/integrity/ima/
H A Dima_queue.c26 static struct tpm_digest *digests; variable
65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry()
118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry()
170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry()
171 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry()
207 digests_arg = digests; in ima_add_template_entry()
272 digests = kzalloc_objs(*digests, ima_tpm_chip->nr_allocated_banks, in ima_init_digests()
274 if (!digests) in ima_init_digests()
278 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests()
286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
H A Dima_api.c31 kfree(entry->digests); in ima_free_template_entry()
43 struct tpm_digest *digests; in ima_alloc_init_template() local
56 digests = kzalloc_objs(*digests, in ima_alloc_init_template()
59 if (!digests) { in ima_alloc_init_template()
65 (*entry)->digests = digests; in ima_alloc_init_template()
H A Dima_template.c361 struct tpm_digest *digests; in ima_restore_template_data() local
370 digests = kzalloc_objs(*digests, in ima_restore_template_data()
373 if (!digests) { in ima_restore_template_data()
378 (*entry)->digests = digests; in ima_restore_template_data()
385 kfree((*entry)->digests); in ima_restore_template_data()
H A Dima_crypto.c617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm()
632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash()
640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash()
645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash()
646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
H A Dima_fs.c163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show()
255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
H A Dima.h49 /* bitset of digests algorithms allowed in the setxattr hook */
108 struct tpm_digest *digests; member
H A DKconfig72 template permits both larger hash digests and longer
/linux/drivers/char/tpm/
H A Dtpm-interface.c373 struct tpm_digest *digests) in tpm_pcr_extend() argument
386 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend()
393 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend()
397 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
H A Dtpm2-cmd.c185 struct tpm_digest *digests) in tpm2_pcr_extend() argument
219 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend()
220 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
/linux/security/keys/trusted-keys/
H A Dtrusted_tpm1.c26 static struct tpm_digest *digests; variable
352 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock()
949 digests = kzalloc_objs(*digests, chip->nr_allocated_banks); in init_digests()
950 if (!digests) in init_digests()
954 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests()
975 kfree(digests); in trusted_tpm_init()
985 kfree(digests); in trusted_tpm_exit()
/linux/net/sunrpc/
H A DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
58 that utilize Camellia ciphers (RFC 3713) and CMAC digests
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
/linux/Documentation/scsi/
H A Dcxgb3i.rst33 from the host driver, computes and inserts the digests, decomposes
40 the digests, then forwarding the header to the host. The payload data,
/linux/include/linux/
H A Dtpm.h476 struct tpm_digest *digests);
503 struct tpm_digest *digests) in tpm_pcr_extend() argument
/linux/Documentation/crypto/
H A Dsha3.rst41 The following functions compute SHA-3 digests::
H A Duserspace-if.rst115 The salg_type value "hash" applies to message digests and keyed message
116 digests. Though, a keyed message digest is referenced by the appropriate
378 - the hash cipher type (keyed message digests)
/linux/Documentation/ABI/testing/
H A Dima_policy166 Example of a 'measure' rule requiring fs-verity's digests
/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst24 The salt is appended when hashing, digests are stored continuously and
/linux/drivers/crypto/
H A DKconfig201 Select this option if you want to use the phmac digests
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst689 enabled files, identified via their fsverity digests.